Internet 101 U.S. National Cybersecurity, Technical Breakout #1 - - PowerPoint PPT Presentation

internet 101
SMART_READER_LITE
LIVE PREVIEW

Internet 101 U.S. National Cybersecurity, Technical Breakout #1 - - PowerPoint PPT Presentation

Internet 101 U.S. National Cybersecurity, Technical Breakout #1 10/5/04 presented by: Martin Casado Network vs. Internet a network is a system of computers that talk over some communication medium: phone line (analogue modem, DSL),


slide-1
SLIDE 1

Internet 101

U.S. National Cybersecurity, Technical Breakout #1 10/5/04

presented by: Martin Casado

slide-2
SLIDE 2

Network vs. Internet

  • a network is a system of computers

that talk over some communication medium: phone line (analogue modem, DSL), cable, fiber etc.

  • the Internet is a global network owned

and operated by many different groups with often conflicting interests, ideals, goals, agendas, and policies

slide-3
SLIDE 3

Today ...

  • What makes up the Internet
  • How the Internet works
  • How the Internet doesn't work

.. and remember ... the information presented here is a GROSS oversimplification.

slide-4
SLIDE 4

Core vs. Edge

  • The Internet can be roughly broken

into the “Core” and the “Edge”

  • The Internet “Edge” is composed of

computers used by people to send or receive content

  • The “Core” are all the computers that

move traffic between computers on the “Edge”

slide-5
SLIDE 5

“Edge” Computers

  • home computers
  • computers that host web pages
  • educational computers
  • business computers
  • governmental computers
  • Internet Cafe's
slide-6
SLIDE 6

“Core” computers

  • Routers : try to figure out how traffic

goes from point A to point B (on the Internet)

  • In the core, routers use a mechanism

called BGP to figure out where to send the packets next (this is a big technical and political rathole!)

slide-7
SLIDE 7

Core vs. Edge

router End Host Core Edge Edge

slide-8
SLIDE 8

Who Owns the Core?

  • Mostly owned by private companies

(ISPs)

  • Can think of Internet as an aggregation
  • f smaller networks
  • Companies are often multi-national

(what might be the implications of this?)

  • Many names you've heard of, AT&T,

MCI, Sprint

slide-9
SLIDE 9
slide-10
SLIDE 10

Edge is you, me and aunt Bev

(and business, and gov and edu)

  • Plug into Internet though an ISP
  • ISP charges us to use their bandwidth
  • ISPs charge other ISPs to lease lines
slide-11
SLIDE 11

IP Addresses

  • Any computer on the Internet can talk

to any other (mostly)

(yeeks! Once you plug in, everyone is your neighbor!)

  • Computers “find” each other through

virtual addresses” called “IP addresses”

  • If someone knows the IP address of

your computer, can talk to you

slide-12
SLIDE 12

What are IP Addresses?

  • Just numbers (with dots)

123.114.23.4 10.15.46.32

  • Really just a value from 1 to (2^32 - 1)

represented 4 in octets (chunks of 2^8)

slide-13
SLIDE 13

IP Addresses Cont ...

Note: Since so many computers are on the Internet; a person, or computer program, can choose an IP at random (just a number remember!) and it will likely be assigned to a computer

  • this process of iterating through lots of

IP Addressess looking for a target is called “SCANNING”

slide-14
SLIDE 14

How Computers Talk

  • Send “packets” of information (called IP

packets or IP datagrams)

  • Packets contain IP address of recipient

and sender, plus data

data ip src | ip dst Packet “header”

slide-15
SLIDE 15

Packets in the Core

  • Packets are moved or “routed” from the

sender to the receiver based on the destination IP address

  • Note that, routers (computers in the

core) ONLY look at the destination

  • Sources can lie about who they are:

“source spoofing”

slide-16
SLIDE 16

IP Packets Cannot be Used for Reliable Services

  • If a computer (router, sender, end-host)

is too busy, will drop packets

  • If the header gets corrupted, packet

gets dropped

  • Data can get corrupted
  • If a router dies, packets will get lost
slide-17
SLIDE 17

Transmission Control Protocol (TCP)

  • Almost all communications on the

Internet use higher-level mechanism (TCP)

  • TCP uses IP packets plus black magic to

ensure...

– Data will not be corrupted – Data will not be lost – Data will arrive in the order it was sent

  • Plus! TCP black magic makes source

forging REALLY hard!

slide-18
SLIDE 18

(just fyi)

User Datagram Protocol (UDP)

  • Sometimes want to send data quickly,

and don't need so much magic

  • Who cares if you loose a bullet or two

while playing Quake?

  • Who cares if bullets come out of order?
  • Not used very often (except for DNS)
slide-19
SLIDE 19

Servers

  • Some computers are only used to house

services such as web pages or email

  • Typically only offer services and aren't

used like home computers

  • Often located as close to the core as

possible (in some basement downtown)

slide-20
SLIDE 20

Servers cont ...

  • When connecting to a website,

connecting to a server

  • When getting your email, connecting to

a server

  • When listening to music online,

connecting to a server

slide-21
SLIDE 21

Clients

  • Programs that connect to services on

servers (used by you, me and Aunt Bev)

  • Web browsers (mozilla, ie, safari etc.)
  • Email clients (outlook, Eudora, ... )
slide-22
SLIDE 22

Domain Name System (DNS)

  • IP addresses are hard to remember

(and boring) ... why not use names instead?

  • Computers in the core map names to IP

addresses

– www.google.com – www.stanford.edu – Called DNS servers

  • “root” name servers most important!

– Only 13! – Heavily guarded in unmarked buildings

slide-23
SLIDE 23

Checking News on the Web

(putting it all together)

  • Sit down at computer and load web browser
  • Type in “news.google.com”
  • My computer asks DNS server to map

news.google.com to IP address

  • DNS server responds with “64.233.167.99” (what

could happen if server lies?!)

  • Computer then uses TCP to ask Google's web server

for news

  • Google's web server responds
  • I procrastinate
slide-24
SLIDE 24

Ports

  • A server can host multiple services (e.g.

Web and email)

  • Each service has a unique “port” (just

another number) that clients connect to

  • Ports are standardized on the Internet

(80 www, 25 sending email, 21 ftp)

  • Hackers see look to see what services

are on a host by “port scanning”

slide-25
SLIDE 25

The Layered Model

(another way to look at things) Physical Network Transport Application

Web, email, ICQ TCP/UDP IP Analogue modem, ethernet, fiber etc.

slide-26
SLIDE 26

Has an Hour Glass Shape?

Ethernet | FDDI | Token Ring IP UDP | TCP Web | Email | Chat | Doom IP runs on everything, everything runs on IP What happens if there is a problem here?

slide-27
SLIDE 27

Each Layer Has its Own Vulnerabilities

  • Physical

– I chop your wires or bomb your building

  • Network

– I forge my source address

  • Transport

– I send too many TCP connection requests and

freeze your computer

  • Application

– I send a bad request to your web server that

makes it croak

slide-28
SLIDE 28

Oh ... and Don't Forget the Weakest Layer of All

Humans Physical Network Transport Application You, me aunt Bev

slide-29
SLIDE 29

Humans are Vulnerable!

  • Susceptible to beer, chocolate and the
  • pposite sex
  • Not experts (and shouldn't be!)
  • Often don't care
slide-30
SLIDE 30

The End!